Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
Face Manipulation Detection (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(1/108)
Export
export all inquiry results
(2)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Future trends in digital face manipulation and detection
Tolosana, Ruben
;
Rathgeb, Christian
;
Vera-Rodriguez, Ruben
;
Busch, Christoph
;
Verdoliva, Luisa
;
Lyu, Siwei
;
Nguyen, Huy H.
;
Yamagishi, Junichi
;
Echizen, Isao
;
Rot, Peter
;
Grm, Klemen
;
Štruc, Vitomir
;
Dantcheva, Antitza
;
Akhtar, Zahid
;
Romero-Tapiador, Sergio
;
Fierrez, Julian
;
Morales, Aythami
;
Ortega-Garcia, Javier
;
Kindt, Els
;
Jasserand, Catherine
;
Kalvet, Tarmo
;
Tiits, Marek
Handbook of digital face manipulation and detection : from deepfakes to morphing attacks
2022
/
p. 463-482 : ill
https://doi.org/10.1007/978-3-030-87664-7_21
book article
2
book article
Promises, social, and ethical challenges with biometrics in remote identity onboarding
Laas-Mikko, Katrin
;
Kalvet, Tarmo
;
Derevski, Robert
;
Tiits, Marek
Handbook of digital face manipulation and detection : from deepfakes to morphing attacks
2022
/
p. 437-462 : ill
https://doi.org/10.1007/978-3-030-87664-7_20
book article
Number of records 2, displaying
1 - 2
keyword
108
1.
Face Manipulation Detection
2.
face detection
3.
grain size manipulation
4.
manipulation
5.
opinion manipulation
6.
profit manipulation
7.
social manipulation
8.
FACE
9.
face masks
10.
face recognition
11.
front-face fluorescence
12.
amoxicillin detection
13.
anomaly detection
14.
anomaly detection for system logs
15.
antibiotic detection
16.
antibiotics detection
17.
aspect detection
18.
asynchronous fault detection
19.
attack detection
20.
barotrauma detection system
21.
body detection
22.
botnet detection
23.
capacitively coupled conductivity detection
24.
change detection
25.
chemical detection
26.
community detection
27.
compu ter-aided detection(CAD)
28.
computer-aided detection
29.
computer‐aided detection
30.
contactless conductivity detection
31.
contactless conductivity detection (C4D)
32.
crash detection
33.
cyber intrusion detection
34.
defect detection
35.
detection
36.
detection efficiency
37.
detection engineering
38.
detection of anomalous end user nodes
39.
detection of hydrogen isotopes
40.
distributed detection
41.
early detection
42.
early intrusion detection
43.
energy detection
44.
error detection
45.
ESI-MS and IM detection
46.
Event detection
47.
extraction and detection methods
48.
failure detection
49.
fall detection
50.
fault detection
51.
fault detection and diagnoses
52.
fault detection and diagnosis
53.
Fish detection
54.
fouling detection
55.
harmonic detection
56.
hepatitis C virus (HCV) detection
57.
hubs detection
58.
IED detection
59.
indicident detection and response
60.
indirect UV absorbance detection
61.
intrusion detection
62.
intrusion detection system (IDS)
63.
intrusion detection systems
64.
island detection
65.
islanding detection
66.
label-free detection
67.
LED fluorescence detection
68.
leg detection
69.
light detection and ranging
70.
Light Detection and Ranging (LiDAR) point cloud
71.
limit of detection
72.
lock-in detection
73.
loop-closure detection
74.
malware detection
75.
marker detection
76.
mobile malware detection
77.
money laundering detection systems
78.
monitoring and detection
79.
multi-classed object detection
80.
mutant detection
81.
network anomaly detection
82.
nodules detection
83.
object detection
84.
oil-spill detection
85.
outlier’s detection methods
86.
outliers detection
87.
peak detection
88.
plagiarism detection
89.
position detection
90.
protein detection
91.
proton detection
92.
radar detection
93.
ramp event detection
94.
recycled FPGA detection
95.
robust detection
96.
scene text detection
97.
short-circuit detection
98.
small molecule detection
99.
speech activity detection
100.
Suicidal ideation detection
101.
synchronous detection
102.
tyre detection
103.
unmanned aerial vehicle detection systems
104.
unsupervised outlier detection
105.
UV detection
106.
vehicle detection
107.
vortex detection
108.
3D lane detection
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT